The data your company collects is a major asset, unless it’s mishandled. Learn how to protect your data to maximize its commercial value, while avoiding costly compliance errors that can cut into your bottom line. The panelists will discuss:

The range of compliance issues associated with the collection and usage of different types of sensitive data

The value of data, marketing of data and restrictions on selling to third parties

Like the consumer data you collect, data privacy laws have little respect for political boundaries. Learn how the EU’s General Data Protection Regulation and California’s Consumer Privacy Act affect businesses far beyond their borders, and the steps you should take now to avoid costly violations.

Spear Phishing. Ransomware. Malware. Like the threats your company faces, the cybersecurity lexicon is constantly evolving. This comprehensive training imparts practical privacy and data security know-how and creates fluency with the latest terminology. Learn best practices for designing and implementing cybersecurity policies and training for your entire workforce, as well as tailored training for those in positions responsible for implementing security policies.

Jill D. Rhodes is Vice President and Chief Information Security Officer for Option Care, Inc., a multibillion-dollar health care company and leading provider of home and alternate treatment infusion services. Jill is responsible for building and implementing the company’s information security program, including all facets of information security governance, education, process development and technology implementation. Prior to joining the private sector, Jill spent more than 20 years working in the intelligence community, including roles with the Office of the Director of National Intelligence, Intelligence Community Chief Information Office, the CIA’s National Clandestine Service and the Department of Homeland Security. A former Foreign Service Officer with the U.S. Agency for International Development, she has written and published on several information security and national security law topics, including serving as co-editor of the ABA Cybersecurity Handbook, and is a regular speaker or national security law topics. She is a certified information security manager, information privacy professional and project management professional.